Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1005894yba; Thu, 4 Apr 2019 02:14:41 -0700 (PDT) X-Google-Smtp-Source: APXvYqyOy2/xf8F8Qu7HC/ERKCXEPUiYJ7DwEDdGz3H1/i3kryQn3syncegPjHdHGGPwT6yBKeVl X-Received: by 2002:a62:4595:: with SMTP id n21mr4665419pfi.79.1554369281706; Thu, 04 Apr 2019 02:14:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554369281; cv=none; d=google.com; s=arc-20160816; b=oGtnzQCpRgq3ty6ZgVO0++E2KxBCZMhymvGJgtLsXoCJVFeyOyZ+1bPxjOztw9et79 2OtK1alUzo+6d8Sosy5mBf/kvphHqyCxyR7C/1X82xHjDSWuofdN9NrGVnJyeQK4OHM7 t4Pf0gjivE6xTLgTDsevl1HDXsmc0W6CfiQ8EsWp4pZNQQbEJjqfmzJxMBRp/lMHJrlq NXuHYmv0DsGirpuiHZushWKKdNaCIFx7b3ma14U13n07Iv8B+Omhm+g+k6ZTP3f5RH8g 5ezyP1S6Mga1b6ORdEH65Di521uQ7A/ACXDOv2H/cM33RUQ5BWsG1SZ2MxfJut4nzPhz x4iA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ztsw8gJDBqNXy4mGzGjYx4W5kOfd/II5iVqO+l0adhI=; b=Li1V2VvXe+0WQag+2oELEJRHasrIY7xYQah7PtFOJj1sKnzlCQKV5XkqI1eyr2joJU kBnNNi7KtiG/vKUl6yLMA5iQvRRciEQrkjnbuQbZZUbALjpx1ga9BaaXvC2Sz7FO0f+e WOeyy9IbKZvawVDMl2y5Sr+IlChLeiqUf4eZC61GcQzKZths+oienuwtMI6r9yKBOiLw d8mckLDadjayfYI7HhZb6ce6JAF+T25+V8yGHPWpft4pfu6uiPrBGDG3lgEZkzNqrlhH UCFNgIwWHH1ZiqkTrkpodFCAjpMW93uY/adTdk8TJ3MT72uJnCtAvLW8IYf9OMz8KBqv qmPg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZCbM3f+k; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a12si15441688pls.209.2019.04.04.02.14.26; Thu, 04 Apr 2019 02:14:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZCbM3f+k; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733145AbfDDJMk (ORCPT + 99 others); Thu, 4 Apr 2019 05:12:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:52708 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733139AbfDDJMi (ORCPT ); Thu, 4 Apr 2019 05:12:38 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C5F072054F; Thu, 4 Apr 2019 09:12:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554369157; bh=kT8noxhhktJYFLqiPWfRFLsAsE6QlEMk6WzL95RDXDo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZCbM3f+kn3/FXWbn/cgPMTIGEMELQThk49ec0zm5N25SXHGFk83K9PHDxiOryNU3/ 9ctmy+Njg6NFqUi0WZ8e5AFIZnAW4xNfrYTY2aJdAmoDPaS7hzaZNO4C/9A2L6Qb+v pTOtof2q+fRDwp7vk3bylSXLYZVCb7W4sLpmJxh0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dongli Zhang , Jan Kara , Jens Axboe , Sasha Levin Subject: [PATCH 5.0 095/246] loop: set GENHD_FL_NO_PART_SCAN after blkdev_reread_part() Date: Thu, 4 Apr 2019 10:46:35 +0200 Message-Id: <20190404084622.469047554@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190404084619.236418459@linuxfoundation.org> References: <20190404084619.236418459@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 5.0-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 758a58d0bc67457f1215321a536226654a830eeb ] Commit 0da03cab87e6 ("loop: Fix deadlock when calling blkdev_reread_part()") moves blkdev_reread_part() out of the loop_ctl_mutex. However, GENHD_FL_NO_PART_SCAN is set before __blkdev_reread_part(). As a result, __blkdev_reread_part() will fail the check of GENHD_FL_NO_PART_SCAN and will not rescan the loop device to delete all partitions. Below are steps to reproduce the issue: step1 # dd if=/dev/zero of=tmp.raw bs=1M count=100 step2 # losetup -P /dev/loop0 tmp.raw step3 # parted /dev/loop0 mklabel gpt step4 # parted -a none -s /dev/loop0 mkpart primary 64s 1 step5 # losetup -d /dev/loop0 Step5 will not be able to delete /dev/loop0p1 (introduced by step4) and there is below kernel warning message: [ 464.414043] __loop_clr_fd: partition scan of loop0 failed (rc=-22) This patch sets GENHD_FL_NO_PART_SCAN after blkdev_reread_part(). Fixes: 0da03cab87e6 ("loop: Fix deadlock when calling blkdev_reread_part()") Signed-off-by: Dongli Zhang Reviewed-by: Jan Kara Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin --- drivers/block/loop.c | 21 +++++++++++++++++---- 1 file changed, 17 insertions(+), 4 deletions(-) diff --git a/drivers/block/loop.c b/drivers/block/loop.c index 2faefdd6f420..9a8d83bc1e75 100644 --- a/drivers/block/loop.c +++ b/drivers/block/loop.c @@ -1089,16 +1089,12 @@ static int __loop_clr_fd(struct loop_device *lo, bool release) kobject_uevent(&disk_to_dev(bdev->bd_disk)->kobj, KOBJ_CHANGE); } mapping_set_gfp_mask(filp->f_mapping, gfp); - lo->lo_state = Lo_unbound; /* This is safe: open() is still holding a reference. */ module_put(THIS_MODULE); blk_mq_unfreeze_queue(lo->lo_queue); partscan = lo->lo_flags & LO_FLAGS_PARTSCAN && bdev; lo_number = lo->lo_number; - lo->lo_flags = 0; - if (!part_shift) - lo->lo_disk->flags |= GENHD_FL_NO_PART_SCAN; loop_unprepare_queue(lo); out_unlock: mutex_unlock(&loop_ctl_mutex); @@ -1120,6 +1116,23 @@ out_unlock: /* Device is gone, no point in returning error */ err = 0; } + + /* + * lo->lo_state is set to Lo_unbound here after above partscan has + * finished. + * + * There cannot be anybody else entering __loop_clr_fd() as + * lo->lo_backing_file is already cleared and Lo_rundown state + * protects us from all the other places trying to change the 'lo' + * device. + */ + mutex_lock(&loop_ctl_mutex); + lo->lo_flags = 0; + if (!part_shift) + lo->lo_disk->flags |= GENHD_FL_NO_PART_SCAN; + lo->lo_state = Lo_unbound; + mutex_unlock(&loop_ctl_mutex); + /* * Need not hold loop_ctl_mutex to fput backing file. * Calling fput holding loop_ctl_mutex triggers a circular -- 2.19.1